Vulnerability Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, non-staff users could access read receipt information for staff-only posts they weren't supposed to see. No post content was exposed, only metadata about who read the post and when. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | >= 2026.1.0, < 2026.1.3 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/bf8dbf6155ae483245d42a0164181bc226Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-xgg2-vwr6-2c65Vendor Advisory
FAQ
What is CVE-2026-32620?
CVE-2026-32620 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, non-staff users could acc...
How severe is CVE-2026-32620?
CVE-2026-32620 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32620?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.